Sept. 15, 2023, 11:25 p.m. | /u/platypus_plumba

cybersecurity www.reddit.com

I'm not in the cybersecurity field, I'm just curious about how these miners are hidden in the Docker images that we pull from Dockerhub.

My initial guess was that some of the binaries in the image are tampered with to hide the processes being executed, for example tampering "ps" or "ls". But this seemed like a pointless approach because the user could install other tools that would reveal the processes.

I don't want to list my whole noob thought process …

cybersecurity docker dockerhub hidden hide image images malware miners processes tampering xmrig

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC